A Secure DCT Image Steganography based on Public-Key Cryptography

International Journal of Computer Trends and Technology (IJCTT)          
© - July Issue 2013 by IJCTT Journal
Volume-4 Issue-7                           
Year of Publication : 2013
Authors :Shahana T


Shahana T"A Secure DCT Image Steganography based on Public-Key Cryptography"International Journal of Computer Trends and Technology (IJCTT),V4(7):2039-2043 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -  —Steganography is the method of hiding information in a multimedia carrier. The carrier(cover) can be an image, audio or video. In this case image is taken as the carrier and the hidden information or secret information. So here dealing with image steganography. Gray level image is taken as both cover and secret images. This paper implements the steganography in frequency domain. A DCT transformation technique is used to convert the cover image from spatial to frequency domain. To provide more security public key cryptography is combined with steganography. A public key encryptionn algorithm RSA is used here. Secret image is encrypted before embedding in the cover image. PSNR value is calculated for both stego and extracted image. An analysis shows that high PSNR value is obtained when the size of secret image is less compared to the size of cover image.


[1] RigDas, Themrichon Tuithung, A Novel Steganography Method for Image Based on Huffman Encoding,2012 IEEE
[2] A. Nag, S. Biswas, D. Sarkar, P. P. Sarkar, A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding. International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010
[3] Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar, A Novel Technique for Image Steganography Based on DWT and Huffman Encoding , International Journal of Computer Science and Security, (IJCSS)Volume 4
[4] Yam bern Jina Chanu,ThemrichonTuithung,Kh.Manglem Singh,A Short Survey on Image Steganography and Steganalysis Techniques, 2012 IEEE
[5] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt,Digital Image Steganography: Survey and Analysis of Current Methods.ELSEVIER Journal on Signal Processing 90 (2010) 727-752
[6] K.B.Raja`, C.R.Chowdary2, Venugopal K R3, L.M.Patnaik , A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images,2005 IEEE
[7] Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav , Steganography Using Least Signicant Bit Algorithm , International Journal of Engineering Research and Applications (IJERA) May-Jun 2012
[8] Shailender Gupta , Ankur Goyal , Bharat Bhushan ,Information Hiding Using Least Significant Bit Steganography and Cryptography , I.J.Modern Education and Computer Science, 2012
[9] Mohammad Ali Bani Younes ,Aman Jantan ,A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008
[10] Gonzalez, R.C. and Woods, R.E., Digital Image Processing using MATLAB, Pearson Education,India,2006
[11] Duane Hanselman and Bruce Littlefield, Mastering MATLAB@7 Pearson Education, India 2008.
[12] William Stallings, Cryptography and Network Security, Principles and Practice, Low Price Edition , Second Edition.

Keywords : — Steganography, frequency domain, DCT, RSA, Stego Image, PSNR.